Firmware Flaw Leaves Netgear Routers Vulnerable To Hacker Takover

Netgear R7000, R6400 and R8000 routers have been found to contain a flaw that could enable them to be exploited and taken over by hackers and cyber criminals.

Through exploiting a command injection flaw would -be hackers can execute arbitrary code on the router’s firmware and wreak havoc with the user’s network.

Netgear security flaw

Twitter user Acew0rm1 was responsible for finding the flaw but had shed little light yet on how the vulnerability was discovered.

Netgear said it is investigation the flaw but has yet to reveal much in the way it plans to fix the flaw or rollout a firmware update to seal the security hole.

“Netgear has recently become aware of the security issue #582384 that allows unauthenticated web pages to pass form input directly to the command-line interface. A remote attacker can potentially inject arbitrary commands which are then executed by the system,” the company said.

Given no list of vulnerable router models has been put out in circulation, it is difficult for users of Netgear users to understand what to do next to bypass the problem.

The computer emergency response team (CERT) has advised people with Netgear routers to stop using the device until more security details are revealed and the company moves to fix the flaw.

“Exploiting this vulnerability is trivial. Users who have the option of doing so should strongly consider discontinuing use of affected devices until a fix is made available,” CERT said.

Such flaws in routers are particularly dangerous and no only do they expose a network to being taken over but hacked routers and also be used to form a botnet with other seized devices from which distributed denial of service (DDoS) attacks can be launched from, as seen with the Mirai bot net, as well as help spread malware.

The Mirai botnet appears to have been responsible for such DDoS attacks as the one aimed at Talk Talk and the Post Office which took down the companies’ broadband services, as well as flatten services such as Twitter and Spotify when it was used to knock out DNS servers supporting the popular web services.

As the spread of the Internet of Things (IoT) gathers pace, such vulnerabilities at the firmware level in hardware are likely to crop up more regularly unless action on encryption standards and certification are established before the spread of such connected devices become more pervasive.

Are you a security pro? Try our quiz!

Roland Moore-Colyer

As News Editor of Silicon UK, Roland keeps a keen eye on the daily tech news coverage for the site, while also focusing on stories around cyber security, public sector IT, innovation, AI, and gadgets.

Recent Posts

US To Ban Huawei, ZTE From Certifying Wireless Kit

US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…

55 mins ago

Anthropic Launches Enterprise-Focused Claude, Plus iPhone App

Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…

3 hours ago

TikTok Viewed As Chinese Influence Tool By Most Americans – Poll

Most people in the United States view TikTok as a Chinese influence tool a poll…

17 hours ago

Ofcom Confirms OnlyFans Investigation Over Age Verification

UK regulator confirms it is investigating whether OnlyFans is doing enough to prevent children accessing…

17 hours ago

Ex Google Staff Fired Over Israel Protest File NLRB Complaint

Dismissed staff file complaint with a US labor board, and allege Google unlawfully terminated their…

19 hours ago

Tesla Axes Entire Supercharger Team, Plus Senior Executives

Elon Musk dismisses two senior Tesla executives, plus the entire division that runs Tesla's Supercharger…

20 hours ago